US20080222708A1 - Implementing access control for queries to a content management system - Google Patents

Implementing access control for queries to a content management system Download PDF

Info

Publication number
US20080222708A1
US20080222708A1 US12/123,723 US12372308A US2008222708A1 US 20080222708 A1 US20080222708 A1 US 20080222708A1 US 12372308 A US12372308 A US 12372308A US 2008222708 A1 US2008222708 A1 US 2008222708A1
Authority
US
United States
Prior art keywords
query
content management
access control
user
management server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/123,723
Other versions
US7761443B2 (en
Inventor
Rupa Bhaghavan
Tawei Hu
Kenneth Carlin Nelson
Randal James Richardt
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US12/123,723 priority Critical patent/US7761443B2/en
Publication of US20080222708A1 publication Critical patent/US20080222708A1/en
Application granted granted Critical
Publication of US7761443B2 publication Critical patent/US7761443B2/en
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2452Query translation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99932Access augmentation or optimizing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99934Query formulation, input preparation, or translation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99937Sorting
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99938Concurrency, e.g. lock management in shared database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99939Privileged access

Definitions

  • the present invention generally relates to databases and more particularly to a method and apparatus for storing and accessing information in content management systems. More specifically, this invention pertains to a method for maintaining security rules for document and folder access within the query process of the content management system.
  • Conventional content management systems typically include a library server (LS), one or more resource managers (RMs) and a client access application program interface (API).
  • a client is coupled by a network to the API and seeks information stored in the resource manager.
  • the library server stores metadata relating to the objects or data stored in the resource manager.
  • the library server also controls the particular objects that a particular client user can access. Client users can submit requests known as queries through the API to search or retrieve metadata stored in the library server or objects stored in the resource manager.
  • Primary content is stored in the resource manager and includes both structured and semi-structured data such as text files, images, web pages, video clips, for example.
  • system metadata is the information created by the content management system itself for access control, storage management, and content tracking and reference. Both user metadata and system metadata reside in the library server that acts as a repository for the metadata in database form.
  • content management systems provide a set of functions for content (data and metadata) creation, content search and retrieval, and content distribution that enable user to manage data, system metadata and user metadata.
  • content management systems provide a set of functions for content (data and metadata) creation, content search and retrieval, and content distribution that enable user to manage data, system metadata and user metadata.
  • one approach is to store the metadata in the library server and to store the primary content (data) in a separate component designated the resource manager.
  • Another approach is to store both metadata and primary content in a common database.
  • both system metadata and user metadata are searchable using SQL generated by a client-side API.
  • the search methodology should allow only authorized personnel to view specific documents and folders. Skilled users can modify the SQL produced by the API to bypass security rules.
  • the present invention satisfies this need, and presents a system, a computer program product, and associated method (collectively referred to herein as “the system” or “the present system”) for implementing access control for queries to a content management system.
  • the present system installed on the content management server, generates the SQL sub-expression to implement the access control rules and merge with the SQL passed from the API.
  • the content management system query API provides capabilities to search within an item type hierarchy, across item types, across linked items, multi-value attributes, versions, and references, as described, for example, in patent application Ser. No. 10/128,306, supra.
  • a built-in access control checking mechanism is implemented on the server side of the content management system.
  • the query SQL statement is built in two layers: the API (client) layer and the server layer.
  • the API sends the query string to the underlying stored procedure.
  • the stored procedure then generates the access control logic based on the configuration parameters of the library server.
  • This access control logic is dynamically added to the query string sent by the API.
  • the stored procedure prepares, builds and executes this new query string as a dynamic SQL statement.
  • the present system allows the content management system query to have the performance advantages of client-side query generation while maintaining the full security model enforced by the server.
  • either the client or the database server could enforce the security by ensuring that the calls made to the server are legal.
  • the access control logic were included in the SQL generated by the API, a security exposure would exist because someone with skill could modify the SQL expression passed to the stored procedure and bypass security.
  • the present system circumvents this security risk by including the access control logic on the server side of the content management system.
  • the server generates the SQL sub-expression that implements the access control rules.
  • the SQL sub-expression is then merged with the SQL passed from the API.
  • the present system provides a stored procedure interface for clients to pass query information using SQL. Any user with the appropriate technical skills can use the relatively simple interface of the present system with ease.
  • One feature of the stored procedure interface is that the SQL passed is updated dynamically with the access control privilege information of the user obtained from the library server.
  • the access control logic is applied to all the intermediate steps of the query. This adds a new level of security to the content management system.
  • the present system maintains security rules even if SQL sent to the server is modified by users with impressive SQL skills.
  • the present system utilizes SQL within the API and stored procedures.
  • the concept of the present system could be applied to other query languages and other client/server systems that include query processing.
  • the present system can be protected by viewing the CLI (call level interface) trace and the event monitor (or equivalent tool).
  • the CLI trace provides information on all parameters passed to the stored procedure, including the SQL string sent by the API, but without the SQL to implement the access control logic.
  • the event monitor would have the completed SQL statement in addition to the access control logic.
  • FIG. 1 is a high level block diagram of a content management system in which an access control logic system of the present invention can be used.
  • FIG. 2 is a process flow chart illustrating a method of operation of the access control logic system of FIG. 1 .
  • API Application Program Interface, a language and message format used by an application program to communicate with the operating system or some other control program such as a database management system (DBMS) or communications protocol.
  • DBMS database management system
  • Attribute a property or characteristic, and more particularly, a field in a database.
  • Item The basic information entities managed by the library server. “Items” as used herein come in two types, simple items and resource items. An item can be, for example, a folder or a document.
  • Metadata data about data. Metadata is definitional data that provides documentation of or information about other data managed within an environment or by an application. Metadata may document data about data elements or attributes such as name, size, or data type. It may also log data about data structures including length, fields, and columns. Other data included in Metadata encompass the association, storage location, and ownership of data. Metadata may additionally include descriptive information about the context, quality and condition, and/or characteristics of data.
  • SQL Structured Query Language, a standardized query language for requesting information from a database.
  • FIG. 1 illustrates an exemplary content management system 100 comprising an access control logic generator (or system) 10 installed with a query processor 15 in a library server 20 .
  • content management system 100 comprises resource manager 25 and application programming interface 30 .
  • the access control logic generator 10 includes a software programming code or computer program product that is typically embedded within, or installed on a computer. Alternatively, the access control logic generator 10 can be saved on a suitable storage medium such as a diskette, a CD, a hard drive, or like devices.
  • a client computer 35 including a client application 40 is coupled to content management system 100 via the application program interface (API) 30 .
  • Library server (LS) 20 is coupled to application program interface 30 and receives queries from client application 40 . These queries seek information that is stored in library server 20 and/or resource manager 25 .
  • Library server 20 includes a query processor 15 that receives queries in a first format from client computer 35 and translates the queries into a second format usable by library server 20 .
  • Library server 20 is coupled to resource manager 25 and contains user and system metadata concerning the primary content (data or objects) that are stored in resource manager 25 .
  • data can be stored in resource manager 25 , for example, business information, applications, text, audio, video and streaming data, to name a few.
  • Content management system 100 employs a rich data model wherein data including metadata is stored in a tree-based hierarchical data structure including multiple database tables.
  • search on the metadata is through either a specific API or via SQL language on some systems. Since content management systems in general provide a much richer data model than their underlying database systems, writing search queries based on a specific API or SQL can be both tedious and inefficient in content management systems without query processor 15 .
  • the content management system 100 with its query processor 15 advantageously insulates the client user from these high levels of query complexity.
  • the access control logic generator 10 restricts which items will be included in the query.
  • Method 200 of content manager 100 utilizing access control logic generator 10 is illustrated by the block diagram of FIG. 2 .
  • the client application 40 sends a query request to content management system 100 .
  • the application program interface 30 converts the query to SQL at block 210 .
  • the query processor 15 parses the SQL string.
  • the access control logic generator then inserts access control logic with every portion of the SQL string parsed in block 215 .
  • the access control logic is created according to access control privilege information of the user obtained from the library server 20 .
  • the library server 20 then executes the resulting SQL statement at block 225 .
  • a sample query that is not expressed in query language can be exemplified as follows:
  • the first portion of the query “Find folders where (criteria)”, requests access to a folder matching some user specified criteria. If the user does not have access to the folder, the query is not resumed by the content management system. This level of security is already implemented by content management systems.
  • the second portion of this query “containing documents where (criteria)”, requests documents matching the user's specified criteria. If the user does not have access to the document, previously the document portion of the query would not be resumed, but the folder request might be returned to the user. To eliminate this potential breach of security, the access control logic generator 10 inserts access control in both portions of the sample query, preventing either document or folder information returning to the user in the absence of proper authorization.
  • a sample query string sent by the application program interface 30 to the query processor 15 is shown below:
  • the access control logic generator 10 generates the following SQL string to verify access authorization of the user.
  • the access control logic generator 10 then includes the access control logic string with the query string, as shown below:

Abstract

A system to generate an SQL sub-expression that implement access control rules stored in a library server. The SQL sub-expression is then merged with the SQL passed from an application program interface (API). The access control checking mechanism is implemented on the server side of the content management system. In this client/server environment, the query SQL statement is built in two layers: the API (client) layer and the server layer. The API sends the query string to the underlying stored procedure. The stored procedure then generates the access control logic based on the configuration parameters of the library server. This access control logic is dynamically added to the query string sent by the API. The stored procedure prepares, builds and executes this new query string as a dynamic SQL statement.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This is a continuation application to U.S. patent application Ser. No. 10/367,086, entitled “Method for Implementing Access Control for Queries to a Content Management System,” filed on Feb. 14, 2003. This application is related to U.S. patent application Ser. No. 10/128,306, entitled “Content Management System and Methodology Featuring Query Conversion Capability for Efficient Searching,” filed on Apr. 23, 2002, the contents of which is incorporated herein by reference.
  • FIELD OF THE INVENTION
  • The present invention generally relates to databases and more particularly to a method and apparatus for storing and accessing information in content management systems. More specifically, this invention pertains to a method for maintaining security rules for document and folder access within the query process of the content management system.
  • BACKGROUND OF THE INVENTION
  • Conventional content management systems typically include a library server (LS), one or more resource managers (RMs) and a client access application program interface (API). A client is coupled by a network to the API and seeks information stored in the resource manager. The library server stores metadata relating to the objects or data stored in the resource manager. The library server also controls the particular objects that a particular client user can access. Client users can submit requests known as queries through the API to search or retrieve metadata stored in the library server or objects stored in the resource manager.
  • Content management systems typically store three types of information, namely primary content (data), user metadata, and system metadata. Primary content is stored in the resource manager and includes both structured and semi-structured data such as text files, images, web pages, video clips, for example. Descriptions of, and information about the primary content stored in the resource manager, which are normally provided by client users, are referred to as “user metadata,” and are stored in the library server.
  • In contrast to “user metadata,” “system metadata” is the information created by the content management system itself for access control, storage management, and content tracking and reference. Both user metadata and system metadata reside in the library server that acts as a repository for the metadata in database form.
  • As compared to primary content, both user and system metadata are well structured. In general, content management systems provide a set of functions for content (data and metadata) creation, content search and retrieval, and content distribution that enable user to manage data, system metadata and user metadata. As mentioned earlier, one approach is to store the metadata in the library server and to store the primary content (data) in a separate component designated the resource manager. Another approach is to store both metadata and primary content in a common database.
  • In most content management systems, both system metadata and user metadata are searchable using SQL generated by a client-side API. For security purposes, the search methodology should allow only authorized personnel to view specific documents and folders. Skilled users can modify the SQL produced by the API to bypass security rules.
  • Current search mechanisms in content management systems can, in response to such a query, return to an unauthorized user a folder that matches a query. The folder does not include the sensitive information, but the existence of the folder gives information to the user that should not be released. Consequently, a skilled user can probe for the existence of classified or sensitive information through the query mechanism. By obtaining a response advising the user that a document matching the search request exists within the folder, a skilled user can search for other types of documents within the folder even though they are not actually authorized to view the documents, potentially creating a serious security exposure.
  • What is therefore needed is a system and method for enforcing security rules during a search for specific data stored in the content management system while maintaining the performance advantages of client-side query generation. The need for such a system and method has heretofore remained unsatisfied.
  • SUMMARY OF THE INVENTION
  • The present invention satisfies this need, and presents a system, a computer program product, and associated method (collectively referred to herein as “the system” or “the present system”) for implementing access control for queries to a content management system. The present system, installed on the content management server, generates the SQL sub-expression to implement the access control rules and merge with the SQL passed from the API.
  • The content management system query API provides capabilities to search within an item type hierarchy, across item types, across linked items, multi-value attributes, versions, and references, as described, for example, in patent application Ser. No. 10/128,306, supra. In addition, a built-in access control checking mechanism is implemented on the server side of the content management system.
  • In this client/server environment, the query SQL statement is built in two layers: the API (client) layer and the server layer. The API sends the query string to the underlying stored procedure. The stored procedure then generates the access control logic based on the configuration parameters of the library server.
  • This access control logic is dynamically added to the query string sent by the API. The stored procedure prepares, builds and executes this new query string as a dynamic SQL statement. The present system allows the content management system query to have the performance advantages of client-side query generation while maintaining the full security model enforced by the server.
  • In a client/server system, either the client or the database server could enforce the security by ensuring that the calls made to the server are legal. However, if the access control logic were included in the SQL generated by the API, a security exposure would exist because someone with skill could modify the SQL expression passed to the stored procedure and bypass security.
  • The present system circumvents this security risk by including the access control logic on the server side of the content management system. The server generates the SQL sub-expression that implements the access control rules. The SQL sub-expression is then merged with the SQL passed from the API.
  • The present system provides a stored procedure interface for clients to pass query information using SQL. Any user with the appropriate technical skills can use the relatively simple interface of the present system with ease. One feature of the stored procedure interface is that the SQL passed is updated dynamically with the access control privilege information of the user obtained from the library server. In addition, the access control logic is applied to all the intermediate steps of the query. This adds a new level of security to the content management system. The present system maintains security rules even if SQL sent to the server is modified by users with impressive SQL skills.
  • The present system utilizes SQL within the API and stored procedures. The concept of the present system could be applied to other query languages and other client/server systems that include query processing.
  • The present system can be protected by viewing the CLI (call level interface) trace and the event monitor (or equivalent tool). The CLI trace provides information on all parameters passed to the stored procedure, including the SQL string sent by the API, but without the SQL to implement the access control logic. The event monitor would have the completed SQL statement in addition to the access control logic.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The various features of the present invention and the manner of attaining them will be described in greater detail with reference to the following description, claims, and drawings, wherein reference numerals are reused, where appropriate, to indicate a correspondence between the referenced items, and wherein:
  • FIG. 1 is a high level block diagram of a content management system in which an access control logic system of the present invention can be used; and
  • FIG. 2 is a process flow chart illustrating a method of operation of the access control logic system of FIG. 1.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • The following definitions and explanations provide background information pertaining to the technical field of the present invention, and are intended to facilitate the understanding of the present invention without limiting its scope:
  • API: Application Program Interface, a language and message format used by an application program to communicate with the operating system or some other control program such as a database management system (DBMS) or communications protocol.
  • Attribute: a property or characteristic, and more particularly, a field in a database.
  • Item: The basic information entities managed by the library server. “Items” as used herein come in two types, simple items and resource items. An item can be, for example, a folder or a document.
  • Metadata: data about data. Metadata is definitional data that provides documentation of or information about other data managed within an environment or by an application. Metadata may document data about data elements or attributes such as name, size, or data type. It may also log data about data structures including length, fields, and columns. Other data included in Metadata encompass the association, storage location, and ownership of data. Metadata may additionally include descriptive information about the context, quality and condition, and/or characteristics of data.
  • SQL: Structured Query Language, a standardized query language for requesting information from a database.
  • FIG. 1 illustrates an exemplary content management system 100 comprising an access control logic generator (or system) 10 installed with a query processor 15 in a library server 20. In addition, content management system 100 comprises resource manager 25 and application programming interface 30. The access control logic generator 10 includes a software programming code or computer program product that is typically embedded within, or installed on a computer. Alternatively, the access control logic generator 10 can be saved on a suitable storage medium such as a diskette, a CD, a hard drive, or like devices.
  • A client computer 35 including a client application 40 is coupled to content management system 100 via the application program interface (API) 30. Library server (LS) 20 is coupled to application program interface 30 and receives queries from client application 40. These queries seek information that is stored in library server 20 and/or resource manager 25. Library server 20 includes a query processor 15 that receives queries in a first format from client computer 35 and translates the queries into a second format usable by library server 20.
  • Library server 20 is coupled to resource manager 25 and contains user and system metadata concerning the primary content (data or objects) that are stored in resource manager 25. Many types of data can be stored in resource manager 25, for example, business information, applications, text, audio, video and streaming data, to name a few.
  • Content management system 100 employs a rich data model wherein data including metadata is stored in a tree-based hierarchical data structure including multiple database tables. Traditionally, search on the metadata is through either a specific API or via SQL language on some systems. Since content management systems in general provide a much richer data model than their underlying database systems, writing search queries based on a specific API or SQL can be both tedious and inefficient in content management systems without query processor 15. The content management system 100 with its query processor 15 advantageously insulates the client user from these high levels of query complexity.
  • The access control logic generator 10 restricts which items will be included in the query. Method 200 of content manager 100 utilizing access control logic generator 10 is illustrated by the block diagram of FIG. 2. At block 205, the client application 40 sends a query request to content management system 100. The application program interface 30 converts the query to SQL at block 210.
  • At block 215, the query processor 15 parses the SQL string. The access control logic generator then inserts access control logic with every portion of the SQL string parsed in block 215. The access control logic is created according to access control privilege information of the user obtained from the library server 20. The library server 20 then executes the resulting SQL statement at block 225.
  • A sample query that is not expressed in query language can be exemplified as follows:
  • Find folders where (criteria)
  • Containing documents where (criteria).
  • The first portion of the query, “Find folders where (criteria)”, requests access to a folder matching some user specified criteria. If the user does not have access to the folder, the query is not resumed by the content management system. This level of security is already implemented by content management systems.
  • The second portion of this query, “containing documents where (criteria)”, requests documents matching the user's specified criteria. If the user does not have access to the document, previously the document portion of the query would not be resumed, but the folder request might be returned to the user. To eliminate this potential breach of security, the access control logic generator 10 inserts access control in both portions of the sample query, preventing either document or folder information returning to the user in the absence of proper authorization.
  • A sample query string sent by the application program interface 30 to the query processor 15 is shown below:
  • SELECT DISTINCT
    ICMCLIENTEXITS_1.ITEMID,
    ICMCLIENTEXITS_1.COMPONENTID,
    ICMCLIENTEXITS_1.VERSIONID,   400 AS
    COMPONENTTYPEID,   400 AS
    ITEMTYPEID  FROM
    ICMADMIN.ICMUT00400001
    ICMCLIENTEXITS_1  WHERE
    (ICMCLIENTEXITS_1.ITEMTYPEVIEW ID =
    1009) AND
  • The access control logic generator 10 generates the following SQL string to verify access authorization of the user.
  • ((( ((EXISTS (SELECT 1 FROM ICMADMIN.ICMSTCOMPILEDACL AS C3,
    ICMADMIN.ICMSTITVIEWDEFS AS V3 WHERE V3.ITEMTYPEID=400 AND
    V3.ITEMTYPEVIEW ID IN (400) AND C3.ACLCODE=V3.ACLCODE AND
    C3.USERID=‘ICMADMIN’ AND C3.PRIVDEFCODE=ICM_PRIV_ITEM_SQL_SELECT)) OR
    (EXISTS (SELECT 1 FROM ICMADMIN.ICMSTCOMPILEDACL AS C4,
    ICMADMIN.ICMSTITVIEWDEFS AS V4, ICMADMIN.ICMSTCOMPILEDPERM AS P4
    WHERE V4.ITEMTYPEID=400 AND V4.ITEMTYPEVIEW ID IN (400) AND
    C4.ACLCODE=V4.ACLCODE AND C4.USERKIND=ICM_USERKIND_PUBLIC AND
    C4.PRIVDEFCODE=ICM_PRIV_ITEM_SQL_SELECT AND
    C4.PRIVDEFCODE=P4.PRIVDEFCODE AND P4.USERID=‘ICMADMIN’))))))
  • The access control logic generator 10 then includes the access control logic string with the query string, as shown below:
  • SELECT DISTINCT ICMCLIENTEXITS_1.ITEMID, ICMCLIENTEXITS_1.COMPONENTID,
    ICMCLIENTEXITS_1.VERSIONID, 400 AS COMPONENTTYPEID, 400 AS ITEMTYPEID FROM
    ICMADMIN.ICMUT00400001 ICMCLIENTEXITS_1 WHERE
    (ICMCLIENTEXITS_1.ITEMTYPEVIEWID = 1009) AND
    ((( ((EXISTS (SELECT 1 FROM ICMADMIN.ICMSTCOMPILEDACL AS C3,
    ICMADMIN.ICMSTITVIEWDEFS AS V3 WHERE V3.ITEMTYPEID=400 AND V3.ITEMTYPEVIEWID
    IN (400) AND C3.ACLCODE=V3.ACLCODE AND C3.USERID=‘ICMADMIN’ AND
    C3.PRIVDEFCODE=ICM_PRIV_ITEM_SQL_SELECT)) OR (EXISTS (SELECT 1 FROM
    ICMADMIN.ICMSTCOMPILEDACL AS C4, ICMADMIN.ICMSTITVIEWDEFS AS V4,
    ICMADMIN.ICMSTCOMPILEDPERM AS P4 WHERE V4.ITEMTYPEID=400 AND
    V4.ITEMTYPEVIEWID IN (400) AND C4.ACLCODE=V4.ACLCODE AND
    C4.USERKIND=ICM_USERKIND_PUBLIC AND C4.PRIVDEFCODE=ICM_PRIV_ITEM_SQL_SELECT
    AND C4.PRIVDEFCODE=P4.PRIVDEFCODE AND P4.USERID=‘ICMADMIN’))))))
  • It is to be understood that the specific embodiments of the invention that have been described are merely illustrative of certain application of the principle of the present invention. Numerous modifications may be made to the system and method for implementing access control for queries to a content management system invention described herein without departing from the spirit and scope of the present invention.

Claims (6)

1. A computer program product having instruction codes stored on a computer-useable medium for implementing access control for a query to a content management system that includes a content management server, the computer program product comprising:
a set of instruction codes executed at a user processor for transmitting the query to the content management server;
wherein the user processor is remotely located relative to the content management server to prevent user access to the content management server and to prevent the bypass of the security of the content management server;
a set of instruction codes executed at the content management server, for parsing the query into a plurality of portions;
a set of instruction codes executed at the content management server, for creating an access control logic string for the query according to an access control privilege information of the user, wherein the access control logic string is query language that prohibits an unauthorized user from accessing restricted data;
a set of instruction codes executed at the content management server, for inserting the access control logic string in each portion of the query that has been parsed to generate a dynamic query, wherein the dynamic query is a result of adding the access control logic string to each of the plurality of portions of the query; and
a set of instruction codes for executing the dynamic query; and a set of instruction codes for generating a secure query result.
2. The computer program product of claim 4, further comprising a set of instruction codes for obtaining the access control privilege of the user from a library server.
3. A processor-implemented system for implementing access control for a query to a content management system that includes a content management server, the system comprising:
means for transmitting the query to the content management server from a user processor;
wherein the user processor is remotely located relative to the content management server to prevent user access to the content management server, to prevent the bypass of the security of the content management server;
means for parsing the query into a plurality of portions at the content management server;
means for creating an access control logic string for the query at the content management server according to an access control privilege information of the user, wherein the access control logic string is query language that prohibits an unauthorized user from accessing restricted data; and
means for inserting the access control logic string in each portion of the query string that has been parsed at the content management server to generate a dynamic query, wherein the dynamic query is a result of adding the access control logic string to each of the plurality of portions of the query;
means for executing the dynamic query; and
means for generating a secure query result.
4. The system of claim 3, further comprising means for obtaining the access control privilege of the user from a library server.
5. A content management system, comprising:
a library server containing a user metadata and a system metadata describing a primary content in a resource manager coupled to the library server, the library server comprising:
an access control logic generator, the access control logic generator inserting access control throughout a first query to prevent access to both the primary content and the user and system metadata describing the primary content from unauthorized users;
a query processor that receives a plurality of queries in a first format from a client computer and translates a plurality of queries into a second format usable by the library server; and
an application program interface, the application program interface coupled between the library server and the resource manager, wherein data is transferred between the library server and the resource manager via the application program interface.
6. The content management system of claim 10 wherein a client computer having a client application is coupled to the content management system via the application program interface.
US12/123,723 2003-02-14 2008-05-20 Implementing access control for queries to a content management system Expired - Fee Related US7761443B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/123,723 US7761443B2 (en) 2003-02-14 2008-05-20 Implementing access control for queries to a content management system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/367,086 US7392246B2 (en) 2003-02-14 2003-02-14 Method for implementing access control for queries to a content management system
US12/123,723 US7761443B2 (en) 2003-02-14 2008-05-20 Implementing access control for queries to a content management system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/367,086 Continuation US7392246B2 (en) 2003-02-14 2003-02-14 Method for implementing access control for queries to a content management system

Publications (2)

Publication Number Publication Date
US20080222708A1 true US20080222708A1 (en) 2008-09-11
US7761443B2 US7761443B2 (en) 2010-07-20

Family

ID=32849897

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/367,086 Expired - Fee Related US7392246B2 (en) 2003-02-14 2003-02-14 Method for implementing access control for queries to a content management system
US12/123,723 Expired - Fee Related US7761443B2 (en) 2003-02-14 2008-05-20 Implementing access control for queries to a content management system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/367,086 Expired - Fee Related US7392246B2 (en) 2003-02-14 2003-02-14 Method for implementing access control for queries to a content management system

Country Status (1)

Country Link
US (2) US7392246B2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100332473A1 (en) * 2009-06-30 2010-12-30 International Business Machines Corporation Correlating queries issued by applications with their source lines and analyzing applications for problem determination and where used analysis
US20140230070A1 (en) * 2013-02-14 2014-08-14 Microsoft Corporation Auditing of sql queries using select triggers
US8863156B1 (en) * 2011-01-04 2014-10-14 AppCentric Solutions, LLC API wizard
CN105511913A (en) * 2015-11-30 2016-04-20 联想(北京)有限公司 Parameter configuration method and electronic device
CN106778089A (en) * 2016-12-01 2017-05-31 联信摩贝软件(北京)有限公司 A kind of system and method that security management and control is carried out to software authority and behavior
CN113282625A (en) * 2021-05-31 2021-08-20 重庆富民银行股份有限公司 SQL-based API data query and processing system and method

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070101408A (en) * 1999-09-02 2007-10-16 이비덴 가부시키가이샤 Printed circuit board and method for manufacturing printed circuit board
US8056141B2 (en) * 2006-09-13 2011-11-08 Imperva, Inc. Method for monitoring stored procedures
US9489418B2 (en) * 2007-04-27 2016-11-08 International Business Machines Corporation Processing database queries embedded in application source code from within integrated development environment tool
US9047337B2 (en) 2007-04-27 2015-06-02 International Business Machines Corporation Database connectivity and database model integration within integrated development environment tool
US8566793B2 (en) * 2007-04-27 2013-10-22 International Business Machines Corporation Detecting and displaying errors in database statements within integrated development environment tool
US8392880B2 (en) * 2007-04-27 2013-03-05 International Business Machines Corporation Rapid application development for database-aware applications
US8375351B2 (en) * 2007-06-23 2013-02-12 International Business Machines Corporation Extensible rapid application development for disparate data sources
US8108373B2 (en) * 2007-08-29 2012-01-31 International Business Machines Corporation Selecting an author of missing content in a content management system
US20100174610A1 (en) * 2008-03-14 2010-07-08 Alejandro Emilio Del Real Internet-Based Personal Media Group Website Technology for Content Management and Exchange (System and Methods)
US20100241668A1 (en) * 2009-03-17 2010-09-23 Microsoft Corporation Local Computer Account Management at Domain Level
US20100250646A1 (en) * 2009-03-25 2010-09-30 Microsoft Corporation Mechanism for geo distributing application data
JP4868191B2 (en) * 2010-03-29 2012-02-01 株式会社Ubic Forensic system, forensic method, and forensic program
JP4898934B2 (en) * 2010-03-29 2012-03-21 株式会社Ubic Forensic system, forensic method, and forensic program
US9087209B2 (en) * 2012-09-26 2015-07-21 Protegrity Corporation Database access control
US9904702B2 (en) 2012-12-04 2018-02-27 Oracle International Corporation Dynamic generation of database queries in query builders
EP2819058A1 (en) * 2013-06-27 2014-12-31 Siemens Aktiengesellschaft Accessing data of a database in a MES system
EP2902926A1 (en) * 2014-01-31 2015-08-05 Hewlett-Packard Development Company, L.P. Filtering data from a database
US9489532B2 (en) * 2014-05-28 2016-11-08 Siemens Product Lifecycle Management Software Inc. Fast access rights checking of configured structure data
US10776507B2 (en) * 2018-06-01 2020-09-15 Sap Se Fine-grained SQL authorizations
CN112612771A (en) * 2020-11-24 2021-04-06 深圳市和讯华谷信息技术有限公司 Data writing method and system
WO2022133799A1 (en) * 2020-12-23 2022-06-30 Citrix Systems, Inc. Cross-language search

Citations (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4751740A (en) * 1984-12-10 1988-06-14 Wang Laboratories, Inc. Apparatus, method, and structure for translating a document having one structure into a document having another structure
US4969091A (en) * 1987-08-06 1990-11-06 Mueller Otto Apparatus for stack control employing mixed hardware registers and memory
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5321841A (en) * 1989-06-29 1994-06-14 Digital Equipment Corporation System for determining the rights of object access for a server process by combining them with the rights of the client process
US5455953A (en) * 1993-11-03 1995-10-03 Wang Laboratories, Inc. Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
US5469576A (en) * 1993-03-22 1995-11-21 International Business Machines Corporation Front end for file access controller
US5615337A (en) * 1995-04-06 1997-03-25 International Business Machines Corporation System and method for efficiently processing diverse result sets returned by a stored procedures
US5644768A (en) * 1994-12-09 1997-07-01 Borland International, Inc. Systems and methods for sharing resources in a multi-user environment
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5701458A (en) * 1995-09-20 1997-12-23 International Business Machines Corporation System and method for managing arbitrary subsets of access control lists in a computer network
US5742810A (en) * 1995-08-31 1998-04-21 International Business Machines Corporation System, method and computer program product for passing host variables to a database management system
US5774719A (en) * 1993-01-08 1998-06-30 Digital Equipment Corporation Method for comparing data structures that cross address space boundaries
US5778398A (en) * 1993-07-20 1998-07-07 Canon Kabushiki Kaisha Document processing to permit sharing of content by plural documents
US5799310A (en) * 1995-05-01 1998-08-25 International Business Machines Corporation Relational database extenders for handling complex data types
US5819252A (en) * 1996-04-10 1998-10-06 Digital Equipment Corporation Method and apparatus for handling and detecting an invalid use of a data structure
US5826268A (en) * 1996-04-12 1998-10-20 Ontos, Inc. Secure multilevel object oriented database management system
US5859966A (en) * 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
US5862378A (en) * 1996-05-31 1999-01-19 International Business Machines Corporation Passing arrays to stored procedures
US5875332A (en) * 1996-05-31 1999-02-23 International Business Machines Corporation Generating a common gateway interface adapter customized for a stored procedure
US5892902A (en) * 1996-09-05 1999-04-06 Clark; Paul C. Intelligent token protected system with network authentication
US5940616A (en) * 1996-05-31 1999-08-17 International Business Machines Corporation Tracker class for object-oriented programming environments
US6012067A (en) * 1998-03-02 2000-01-04 Sarkar; Shyam Sundar Method and apparatus for storing and manipulating objects in a plurality of relational data managers on the web
US6016394A (en) * 1997-09-17 2000-01-18 Tenfold Corporation Method and system for database application software creation requiring minimal programming
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
US6065117A (en) * 1997-07-16 2000-05-16 International Business Machines Corporation Systems, methods and computer program products for sharing state information between a stateless server and a stateful client
US6063133A (en) * 1995-08-31 2000-05-16 International Business Machines Corporation No preprocessor for embedded SQL in a 3GL
US6088524A (en) * 1995-12-27 2000-07-11 Lucent Technologies, Inc. Method and apparatus for optimizing database queries involving aggregation predicates
US6104393A (en) * 1998-06-11 2000-08-15 International Business Machines Corporation Integration of procedural and object-oriented user interfaces
US6128621A (en) * 1997-10-31 2000-10-03 Oracle Corporation Apparatus and method for pickling data
US6148342A (en) * 1998-01-27 2000-11-14 Ho; Andrew P. Secure database management system for confidential records using separately encrypted identifier and access request
US6161182A (en) * 1998-03-06 2000-12-12 Lucent Technologies Inc. Method and apparatus for restricting outbound access to remote equipment
US6167405A (en) * 1998-04-27 2000-12-26 Bull Hn Information Systems Inc. Method and apparatus for automatically populating a data warehouse system
US6173400B1 (en) * 1998-07-31 2001-01-09 Sun Microsystems, Inc. Methods and systems for establishing a shared secret using an authentication token
US6212511B1 (en) * 1997-10-31 2001-04-03 Sun Microsystems, Inc. Distributed system and method for providing SQL access to management information in a secure distributed network
US6219826B1 (en) * 1996-08-01 2001-04-17 International Business Machines Corporation Visualizing execution patterns in object-oriented programs
US6233586B1 (en) * 1998-04-01 2001-05-15 International Business Machines Corp. Federated searching of heterogeneous datastores using a federated query object
US20010002486A1 (en) * 1998-01-02 2001-05-31 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US20010008015A1 (en) * 1997-05-02 2001-07-12 Son Trung Vu Method and apparatus for secure processing of cryptographic keys
US6263313B1 (en) * 1998-08-13 2001-07-17 International Business Machines Corporation Method and apparatus to create encoded digital content
US6263342B1 (en) * 1998-04-01 2001-07-17 International Business Machines Corp. Federated searching of heterogeneous datastores using a federated datastore object
US6272488B1 (en) * 1998-04-01 2001-08-07 International Business Machines Corporation Managing results of federated searches across heterogeneous datastores with a federated collection object
US6279111B1 (en) * 1998-06-12 2001-08-21 Microsoft Corporation Security model using restricted tokens
US6282649B1 (en) * 1997-09-19 2001-08-28 International Business Machines Corporation Method for controlling access to electronically provided services and system for implementing such method
US20010019614A1 (en) * 2000-10-20 2001-09-06 Medna, Llc Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data
US6289344B1 (en) * 1998-05-11 2001-09-11 International Business Machines Corporation Context-sensitive authorization in an RDBMS
US6289458B1 (en) * 1998-09-21 2001-09-11 Microsoft Corporation Per property access control mechanism
US6292936B1 (en) * 1998-11-12 2001-09-18 International Business Machines Corporation Enabling multiple runtime processors in an interpreter-based embedded scripting system
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
US20010037317A1 (en) * 2000-04-26 2001-11-01 Ray Freiwirth Method and system for dynamic interactive queries
US6314449B1 (en) * 1998-08-28 2001-11-06 International Business Machines Corporation Method and system for accessing application log messages appearing in a web-based user interface in a distributed network
US6327629B1 (en) * 1996-05-31 2001-12-04 International Business Machines Corporation Stored procedure universal calling interface
US6338056B1 (en) * 1998-12-14 2002-01-08 International Business Machines Corporation Relational database extender that supports user-defined index types and user-defined search
US6339777B1 (en) * 1999-07-30 2002-01-15 International Business Machines Corporation Method and system for handling foreign key update in an object-oriented database environment
US6343286B1 (en) * 1998-09-24 2002-01-29 International Business Machines Corporation Efficient technique to defer large object access with intermediate results
US20030018607A1 (en) * 2000-08-04 2003-01-23 Lennon Alison Joan Method of enabling browse and search access to electronically-accessible multimedia databases
US6591272B1 (en) * 1999-02-25 2003-07-08 Tricoron Networks, Inc. Method and apparatus to make and transmit objects from a database on a server computer to a client computer
US20030187848A1 (en) * 2002-04-02 2003-10-02 Hovhannes Ghukasyan Method and apparatus for restricting access to a database according to user permissions

Patent Citations (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4751740A (en) * 1984-12-10 1988-06-14 Wang Laboratories, Inc. Apparatus, method, and structure for translating a document having one structure into a document having another structure
US4969091A (en) * 1987-08-06 1990-11-06 Mueller Otto Apparatus for stack control employing mixed hardware registers and memory
US5321841A (en) * 1989-06-29 1994-06-14 Digital Equipment Corporation System for determining the rights of object access for a server process by combining them with the rights of the client process
US5204961A (en) * 1990-06-25 1993-04-20 Digital Equipment Corporation Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5774719A (en) * 1993-01-08 1998-06-30 Digital Equipment Corporation Method for comparing data structures that cross address space boundaries
US5469576A (en) * 1993-03-22 1995-11-21 International Business Machines Corporation Front end for file access controller
US5778398A (en) * 1993-07-20 1998-07-07 Canon Kabushiki Kaisha Document processing to permit sharing of content by plural documents
US5455953A (en) * 1993-11-03 1995-10-03 Wang Laboratories, Inc. Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
US5644768A (en) * 1994-12-09 1997-07-01 Borland International, Inc. Systems and methods for sharing resources in a multi-user environment
US5615337A (en) * 1995-04-06 1997-03-25 International Business Machines Corporation System and method for efficiently processing diverse result sets returned by a stored procedures
US5799310A (en) * 1995-05-01 1998-08-25 International Business Machines Corporation Relational database extenders for handling complex data types
US6047291A (en) * 1995-05-01 2000-04-04 International Business Machines Corporation Relational database extenders for handling complex data types
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5742810A (en) * 1995-08-31 1998-04-21 International Business Machines Corporation System, method and computer program product for passing host variables to a database management system
US6063133A (en) * 1995-08-31 2000-05-16 International Business Machines Corporation No preprocessor for embedded SQL in a 3GL
US5701458A (en) * 1995-09-20 1997-12-23 International Business Machines Corporation System and method for managing arbitrary subsets of access control lists in a computer network
US5859966A (en) * 1995-10-10 1999-01-12 Data General Corporation Security system for computer systems
US6088524A (en) * 1995-12-27 2000-07-11 Lucent Technologies, Inc. Method and apparatus for optimizing database queries involving aggregation predicates
US5819252A (en) * 1996-04-10 1998-10-06 Digital Equipment Corporation Method and apparatus for handling and detecting an invalid use of a data structure
US5826268A (en) * 1996-04-12 1998-10-20 Ontos, Inc. Secure multilevel object oriented database management system
US6067414A (en) * 1996-05-31 2000-05-23 International Business Machines Corporation Generating a common gateway interface adaptor customized for a stored procedure
US5940616A (en) * 1996-05-31 1999-08-17 International Business Machines Corporation Tracker class for object-oriented programming environments
US5875332A (en) * 1996-05-31 1999-02-23 International Business Machines Corporation Generating a common gateway interface adapter customized for a stored procedure
US5862378A (en) * 1996-05-31 1999-01-19 International Business Machines Corporation Passing arrays to stored procedures
US6327629B1 (en) * 1996-05-31 2001-12-04 International Business Machines Corporation Stored procedure universal calling interface
US6219826B1 (en) * 1996-08-01 2001-04-17 International Business Machines Corporation Visualizing execution patterns in object-oriented programs
US5892902A (en) * 1996-09-05 1999-04-06 Clark; Paul C. Intelligent token protected system with network authentication
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
US20010008015A1 (en) * 1997-05-02 2001-07-12 Son Trung Vu Method and apparatus for secure processing of cryptographic keys
US6065117A (en) * 1997-07-16 2000-05-16 International Business Machines Corporation Systems, methods and computer program products for sharing state information between a stateless server and a stateful client
US6016394A (en) * 1997-09-17 2000-01-18 Tenfold Corporation Method and system for database application software creation requiring minimal programming
US6282649B1 (en) * 1997-09-19 2001-08-28 International Business Machines Corporation Method for controlling access to electronically provided services and system for implementing such method
US6128621A (en) * 1997-10-31 2000-10-03 Oracle Corporation Apparatus and method for pickling data
US6212511B1 (en) * 1997-10-31 2001-04-03 Sun Microsystems, Inc. Distributed system and method for providing SQL access to management information in a secure distributed network
US20010002486A1 (en) * 1998-01-02 2001-05-31 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus
US6148342A (en) * 1998-01-27 2000-11-14 Ho; Andrew P. Secure database management system for confidential records using separately encrypted identifier and access request
US6012067A (en) * 1998-03-02 2000-01-04 Sarkar; Shyam Sundar Method and apparatus for storing and manipulating objects in a plurality of relational data managers on the web
US6161182A (en) * 1998-03-06 2000-12-12 Lucent Technologies Inc. Method and apparatus for restricting outbound access to remote equipment
US6233586B1 (en) * 1998-04-01 2001-05-15 International Business Machines Corp. Federated searching of heterogeneous datastores using a federated query object
US6263342B1 (en) * 1998-04-01 2001-07-17 International Business Machines Corp. Federated searching of heterogeneous datastores using a federated datastore object
US6272488B1 (en) * 1998-04-01 2001-08-07 International Business Machines Corporation Managing results of federated searches across heterogeneous datastores with a federated collection object
US6167405A (en) * 1998-04-27 2000-12-26 Bull Hn Information Systems Inc. Method and apparatus for automatically populating a data warehouse system
US6289344B1 (en) * 1998-05-11 2001-09-11 International Business Machines Corporation Context-sensitive authorization in an RDBMS
US6104393A (en) * 1998-06-11 2000-08-15 International Business Machines Corporation Integration of procedural and object-oriented user interfaces
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
US6279111B1 (en) * 1998-06-12 2001-08-21 Microsoft Corporation Security model using restricted tokens
US6173400B1 (en) * 1998-07-31 2001-01-09 Sun Microsystems, Inc. Methods and systems for establishing a shared secret using an authentication token
US6263313B1 (en) * 1998-08-13 2001-07-17 International Business Machines Corporation Method and apparatus to create encoded digital content
US6314449B1 (en) * 1998-08-28 2001-11-06 International Business Machines Corporation Method and system for accessing application log messages appearing in a web-based user interface in a distributed network
US6289458B1 (en) * 1998-09-21 2001-09-11 Microsoft Corporation Per property access control mechanism
US6343286B1 (en) * 1998-09-24 2002-01-29 International Business Machines Corporation Efficient technique to defer large object access with intermediate results
US6292936B1 (en) * 1998-11-12 2001-09-18 International Business Machines Corporation Enabling multiple runtime processors in an interpreter-based embedded scripting system
US6338056B1 (en) * 1998-12-14 2002-01-08 International Business Machines Corporation Relational database extender that supports user-defined index types and user-defined search
US6591272B1 (en) * 1999-02-25 2003-07-08 Tricoron Networks, Inc. Method and apparatus to make and transmit objects from a database on a server computer to a client computer
US6339777B1 (en) * 1999-07-30 2002-01-15 International Business Machines Corporation Method and system for handling foreign key update in an object-oriented database environment
US20010037317A1 (en) * 2000-04-26 2001-11-01 Ray Freiwirth Method and system for dynamic interactive queries
US20030018607A1 (en) * 2000-08-04 2003-01-23 Lennon Alison Joan Method of enabling browse and search access to electronically-accessible multimedia databases
US20010019614A1 (en) * 2000-10-20 2001-09-06 Medna, Llc Hidden Link Dynamic Key Manager for use in Computer Systems with Database Structure for Storage and Retrieval of Encrypted Data
US20030187848A1 (en) * 2002-04-02 2003-10-02 Hovhannes Ghukasyan Method and apparatus for restricting access to a database according to user permissions

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100332473A1 (en) * 2009-06-30 2010-12-30 International Business Machines Corporation Correlating queries issued by applications with their source lines and analyzing applications for problem determination and where used analysis
US9020939B2 (en) 2009-06-30 2015-04-28 International Business Machines Corporation Correlating queries issued by applications with their source lines and analyzing applications for problem determination and where used analysis
US10013331B2 (en) 2009-06-30 2018-07-03 International Business Machines Corporation Correlating queries issued by applications with their source lines and analyzing applications for problem determination and where used analysis
US8863156B1 (en) * 2011-01-04 2014-10-14 AppCentric Solutions, LLC API wizard
US20140230070A1 (en) * 2013-02-14 2014-08-14 Microsoft Corporation Auditing of sql queries using select triggers
CN105511913A (en) * 2015-11-30 2016-04-20 联想(北京)有限公司 Parameter configuration method and electronic device
CN106778089A (en) * 2016-12-01 2017-05-31 联信摩贝软件(北京)有限公司 A kind of system and method that security management and control is carried out to software authority and behavior
CN113282625A (en) * 2021-05-31 2021-08-20 重庆富民银行股份有限公司 SQL-based API data query and processing system and method

Also Published As

Publication number Publication date
US7761443B2 (en) 2010-07-20
US7392246B2 (en) 2008-06-24
US20040162825A1 (en) 2004-08-19

Similar Documents

Publication Publication Date Title
US7761443B2 (en) Implementing access control for queries to a content management system
US7086000B2 (en) Tagging related files in a document management system
US6240429B1 (en) Using attached properties to provide document services
Bertino et al. Securing XML documents with Author-X
US7617190B2 (en) Data feeds for management systems
US6397231B1 (en) Virtual documents generated via combined documents or portions of documents retrieved from data repositories
US6562076B2 (en) Extending application behavior through active properties attached to a document in a document management system
US9122750B2 (en) Classifying objects
US7774383B2 (en) Displaying facet tree elements and logging facet element item counts to a sequence document
US7487191B2 (en) Method and system for model-based replication of data
US6324551B1 (en) Self-contained document management based on document properties
US6772137B1 (en) Centralized maintenance and management of objects in a reporting system
US7200593B2 (en) Document management system
EP1424618A1 (en) Method and computer system for protecting electronic documents
Davis Referential integrity of links in open hypermedia systems
US7912933B2 (en) Tags for management systems
Yu et al. Compressed accessibility map: Efficient access control for XML
US20070050467A1 (en) Digital asset management system, including customizable metadata model for asset cataloging and permissioning of digital assets, such as for use with digital images and songs
US20020097278A1 (en) Use of special directories for encoding semantic information in a file system
US7503075B2 (en) Access trimmed user interface
US8019791B2 (en) Method and system for transforming metadata modeled in the common information model into grid control target metadata
WO2008045634A1 (en) Integration of database reporting with erp systems
JP2006012146A (en) System and method for impact analysis
US7020648B2 (en) System and method for identifying and utilizing a secondary index to access a database using a management system without an internal catalogue of online metadata
US5299122A (en) Table manipulations for enterprise specific search terms

Legal Events

Date Code Title Description
REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20140720